// reference · 802.11 status & reason codes

When your PCAP says something went wrong — here's what it actually means

Status codes live in association and authentication responses. Reason codes live in deauth and disassoc frames. Every non-zero code is telling you exactly why the client was rejected or disconnected — but only if you know what to look for.

— Shankar K. · Source: IEEE 802.11-2020 + field notes

// how to find these in wireshark
wlan_mgt.fixed.status_code
Status code field in assoc/auth response frames
wlan_mgt.fixed.reason_code
Reason code field in deauth/disassoc frames
Status codes appear in Association Response, Reassociation Response, and Authentication Response frames. Code 0 = success. Anything else = rejected, and the code tells you exactly why.
Code
Name
What it means in your PCAP
0
Success
Association or authentication accepted. You should see EAPOL frames next if it's an enterprise network.
1
Unspecified failure
AP rejected the request but didn't say why. Usually a policy decision — RADIUS rejected the user, or AP-side ACL. Check RADIUS logs, not the PCAP.
10
Cannot support all capabilities
Client's Capabilities field in AssocReq contains a bit the AP doesn't support (or vice versa). Compare the Capability Information fields frame by frame.
12
Association denied (unspecified reason)
AP denied association without a specific code. Common when the AP is rate-limiting associations or a vendor-specific policy blocked the client.
16
Association denied — timeout
AP sent a challenge text that the client didn't respond to in time. Less common with modern WPA2/WPA3 — more of a legacy open auth issue.
17
AP full (too many associations)
AP has hit its maximum client count. Check the AP's max-association config. If this happens at a venue, it's a capacity planning failure.
23
Cipher suite rejected
Client proposed a cipher in its RSN IE that the AP doesn't accept. Compare RSN IE in the beacon vs RSN IE in the AssocReq — the mismatch will be visible. Classic WPA3 migration failure.
24
AKM suite rejected
The authentication method (SAE, PSK, 802.1X, FT variant) in the client's RSN IE doesn't match what the AP accepts. Check the AKM OUI: 00-0F-AC:2 = PSK, :8 = SAE, :3/:4 = FT variants.
37
Authentication rejected (outside policy)
AP policy explicitly rejected this client — MAC filter, time-of-day restriction, or guest portal timeout. Not a protocol issue.
53 KEY
Invalid PMKID
The most misdiagnosed roaming failure. Client attempted 802.11r Fast Transition but the AP rejected the PMKID. This means the PMK-R1 key hierarchy is broken — the key the client thinks it has doesn't match what the AP expects. Logs say "roaming success." The PCAP says status 53. They're not the same roam. Read the full post →
72
FILS authentication failure
Fast Initial Link Setup (802.11ai) authentication failed. FILS is used for sub-100ms roaming in stadium/venue deployments. Failure usually means expired FILS keys or misconfigured FILS domain.
WiFi Analyser decodes these automatically
Upload a PCAP and every deauth/disassoc reason code and status code is flagged, explained, and linked to the relevant client session.
try it free ↗
SK
Shankar K., Wi-Fi engineer, Irving TX
Building WiFi Analyser V2 · CWNA-109 in progress · one post every two weeks
// share this page
// also on this site
reference
MCS Rate Calculator
reference
Wireshark Filter Reference
downloads
Frame Lab — free PCAPs
← previous
reference
Wireshark Filter Reference
next →
downloads
Frame Lab — free PCAPs
SK
Shankar K., Wi-Fi engineer, Irving TX
Building WiFi Analyser V2 · CWNA-109 in progress · one post every two weeks